• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.039 seconds

A Model-Based Image Steganography Method Using Watson's Visual Model

  • Fakhredanesh, Mohammad;Safabakhsh, Reza;Rahmati, Mohammad
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.479-489
    • /
    • 2014
  • This paper presents a model-based image steganography method based on Watson's visual model. Model-based steganography assumes a model for cover image statistics. This approach, however, has some weaknesses, including perceptual detectability. We propose to use Watson's visual model to improve perceptual undetectability of model-based steganography. The proposed method prevents visually perceptible changes during embedding. First, the maximum acceptable change in each discrete cosine transform coefficient is extracted based on Watson's visual model. Then, a model is fitted to a low-precision histogram of such coefficients and the message bits are encoded to this model. Finally, the encoded message bits are embedded in those coefficients whose maximum possible changes are visually imperceptible. Experimental results show that changes resulting from the proposed method are perceptually undetectable, whereas model-based steganography retains perceptually detectable changes. This perceptual undetectability is achieved while the perceptual quality - based on the structural similarity measure - and the security - based on two steganalysis methods - do not show any significant changes.

An Exploratory Study of Smartphone Fashion Application to Promote Mobile Shopping (모바일 쇼핑 활성화를 위한 스마트폰 패션 어플리케이션에 대한 탐색적 연구)

  • Sung, Heewon
    • Fashion & Textile Research Journal
    • /
    • v.14 no.6
    • /
    • pp.941-951
    • /
    • 2012
  • As smartphones permeate the consumer lifestyle, branded application and mobile shopping have also received increased attention as an important marketing channel. This study identifies the general information about the use of smartphones, attitudes toward fashion applications, and mobile shopping intentions for smartphone users. Focus group interviews were conducted and 22 interviewees participated. The age of the participants ranged from 21 to 45 years old (55% were females). When examining the motivation to adopt a smartphone, respondents presented the comparable characteristics of early adopters and late adopters according to the time of adoption. Most respondents over the age of 30 showed some troubles to use a smartphone; however, participants in their 20s tended to enjoy exploring the new technology. More than half of respondents were aware of fashion applications, but were dissatisfied with fashion apps and used them infrequently. Respondents pointed out that fashion related apps were not too practical because they were not updated regularly, provided only limited information, and focused on brand promotions. In order to increase the intention to adopt mobile shopping, the price and payment security system needs to be considered. This was an exploratory study to identify the possibility of fashion branded apps as a major distribution channel. The findings of this study provide fundamental information to formulate marketing strategies for fashion businesses that have developed fashion apps.

Context-based classification for harmful web documents and comparison of feature selecting algorithms

  • Kim, Young-Soo;Park, Nam-Je;Hong, Do-Won;Won, Dong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.867-875
    • /
    • 2009
  • More and richer information sources and services are available on the web everyday. However, harmful information, such as adult content, is not appropriate for all users, notably children. Since internet is a worldwide open network, it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse ways, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies and examine which algorithms for feature selection, the process that select content terms, as features, can be useful for text categorization in all content term occurs in documents, are suitable for classifying harmful contents through implementation and experiment.

  • PDF

A Study on Performance analysis of protocol in VPN (가상 사설망에서 프로토롤의 성능분석에 관한 연구)

  • 김도문;전문석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.625-632
    • /
    • 2003
  • We are view of the information on VPN(Virtual private Network) into each difference layer protocol. network on mutuality exchanged of information is importance of the confidentiality and Integrity. But it is presented problems about compatability and availability between variable equipment as several protocol. hence, it was achieved of the transmission through encryption and authentication of information, although there is secured an intended attack from the third intruder. so tunneling VPN system on achieving, each layer position transmit of mutuality exchanged. This study will investigate the codification and certified security status when layer2 and layer 3 informations are each transmitted using protocol with integrity Public Key. In addition, we will using protocol and the performance analysis difference between layers and layers.

  • PDF

Design and Implementation of MQTT Based Real-time HVAC Control Systems (MQTT 기반 실시간 공조제어 시스템 설계 및 구현)

  • Jung, Hun;Park, Chong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1163-1172
    • /
    • 2015
  • In this paper, an MQTT based protocol is designed and implemented for control, management and monitoring of HVAC in a cloud platform in real time. The MQTT protocol is a two-way messaging protocol, and has the generality, flexibility, light weighted, quickness with reliability and security. In the implemented system, performance and reliability of the communication protocol is considered for data acquisition and control between the CCU and the cloud server. Control and monitoring for the cloud server is performed in real time in conjunction with CCU and the MQTT server.

An Optimal Algorithm for the Design of a Proxy Blind Signature Agent (대리 은닉서명 에이전트의 설계를 위한 최적화 알고리즘)

  • Rhee, Hyunsook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.85-92
    • /
    • 2013
  • In this paper, on the basis of Guilin Wang's proxy signature scheme and the Schnorr blind signature, we propose a secure proxy blind signature scheme. A proxy blind signature scheme is a digital signature scheme which combines the properties of a proxy signature and a blind signature scheme. Guilin Wang proposed a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. Also, using the proposed proxy blind signature scheme, we propose the proxy agent system for the electronic voting. We show the proposed scheme satisfies the security properties of both the blind signature and the proxy signature scheme and is efficient and optimal proxy blind signature scheme.

The consistency properties for management of RBAC relationship informations on the LMUX server environments (리눅스 서버 환경에서 RBAC 관계정보 관리를 위한 일관성 특성)

  • 오석균;김성열
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.05a
    • /
    • pp.91-96
    • /
    • 1999
  • Role-Based Access Control(RBAC) is an access control mechanism that reduce the cost of administering access control policies. The Admin Tool developed for RBAC Model manages relationship informations of user and role. In order to maintain the consistency of the information for these relationships, a set of properties defining consistency of the relationship informations is required. When it will be designed security systems applying RBAC policy on the Linux server system environments, this paper described consistency properties of relationship informations for information management of user and role relationships. It leads us to the development of minimal set obtainable the equivalent results of consistency properties for a more efficient Admin Tool implementation.

  • PDF

A Study for risk management on Documentary Collection(D/P, D/A) Payment (추심결제(D/P, D/A)방식에서의 위험관리에 관한 연구)

  • Kwak, Su-Young
    • International Commerce and Information Review
    • /
    • v.10 no.2
    • /
    • pp.283-304
    • /
    • 2008
  • According to globalization and localization of world economics international trade payment method was also changed. A traditional payment was Letter of Credit basis, however it is being increased to various methods such as remittance, documentary collection(D/P, D/A) and open account. In order to acquire a secure export payment, exporters prefer to L/C basis which is guaranteed by a reliable bank. However, the L/C should bear a security so that importers would rather documentary collection than L/C. The reasons for the preference of collection payment rather than L/C are a low commission cost, the conversion of buyer's market from seller's market due to severe competition in the world market, transaction increase between main office and branches and a right to control the goods until executing the payment by exporters. Besides of them, collection payment can handle safer and faster than open account basis. However, the collection payment has a risk which it isn't guaranteed by bank for the payment so that I would suggest countermeasures to minimize the payment risk utilizing the collection basis as follows; using export credit insurance system, a large domestic credit report provider such as D&B for absolutely fresh and new information, a collection proxy service for overseas deferred credit and suggestion specifying to order B/L not straight one on consignee in order to transfer the right of ownership with endorsement without problem.

  • PDF

The Effect of Service Quality of Internet Banking Site ad Characteristic of lInternet User on Customer Loyalty (인터넷뱅킹 사이트의 서비스품질과 인터넷 이용자 개인특성이 고객충성도에 미치는 영향)

  • Jeon, Byeong-Ho;Yoon, Jong-Hoon;Song, In-Am;Kim, Byung-Gon
    • The Journal of Information Systems
    • /
    • v.14 no.1
    • /
    • pp.197-226
    • /
    • 2005
  • Recently, internet as well as internet banking are growing rapidly. Most banks in Korea provide internet banking services for customers. Internet banking became a major trend in the financial marketplace. There are a few empirical research in this area. Although quality of internet banking service is an important concept, there is a lack of theory-based empirical research in this area. Therefore, this paper is aimed at finding whether service quality of internet banking influence customer satisfaction, and whether characteristic of internet banking user influence relationship between customer satisfaction and service quality of internet banking. Furthermore, this paper identify whether customer satisfaction influence customer loyalty. The research model proposed thirteen hypothesis and tested empirically. A total of 269 responses were received from internet banking users and analyzed. The analyses showed partial support for the affirmative effect of customer satisfaction and characteristic of internet banking user. But the relationship between customer satisfaction and customer loyalty is significant. Implications of these findings are that internet banking sites should concentrate on providing a high quality of banking services; information, trust, ease of use, and security of system and thereby strengthen customer loyalty.

  • PDF

A DRM Scheme for Multi-CMSs Interoperability Based on Integrated Metadata (다중 CMS 상호운영을 위한 통합메타데이터기반의 DRM기법)

  • Li, Yong-Zhen;Cho, Young-Bok;Sun, Ning;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9C
    • /
    • pp.676-682
    • /
    • 2008
  • With the coming of information times, digital contents are widely applied in various fields of the society. Along with this, scholars provided many techniques and research approaches related to digital contents management and copyright protection. But till now, most proposed techniques and approaches are based on single system. The independency and separation among management systems causes the problems such as application across systems are limited, and resources sharing can't be available, etc. In this paper, for the application cross systems and contents sharing, we propose the cross-systems DRM approach based on unified metadata. This approach can be applied for the incorporation of multiple congeneric or heterogeneous CMSs, in the same time, solve the copyright problem cross digital content systems.